/system/keymaster/ |
H A D | operation_table.cpp | 24 #include "operation.h" 29 delete operation; 30 operation = NULL; 34 keymaster_error_t OperationTable::Add(Operation* operation, argument 42 UniquePtr<Operation> op(operation); 52 if (table_[i].operation == NULL) { 53 table_[i].operation = op.release(); 70 return table_[i].operation; 81 delete table_[i].operation; 82 table_[i].operation [all...] |
H A D | operation_table.h | 35 operation = NULL; 39 Operation* operation; member in struct:keymaster::OperationTable::Entry 42 keymaster_error_t Add(Operation* operation, keymaster_operation_handle_t* op_handle);
|
H A D | android_keymaster.cpp | 36 #include "operation.h" 262 UniquePtr<Operation> operation( 264 if (operation.get() == NULL) 272 operation->set_key_id(key_id); 281 response->error = operation->Begin(request.additional_params, &response->output_params); 285 operation->SetAuthorizations(key->authorizations()); 286 response->error = operation_table_->Add(operation.release(), &response->op_handle); 295 Operation* operation = operation_table_->Find(request.op_handle); local 296 if (operation == NULL) 301 operation 324 Operation* operation = operation_table_->Find(request.op_handle); local [all...] |
/system/connectivity/shill/ |
H A D | arp_client_test_helper.cc | 32 void ArpClientTestHelper::GeneratePacket(uint16_t operation, argument 37 packet_.set_operation(operation); 49 packet->set_operation(packet_.operation());
|
H A D | arp_packet.cc | 106 const uint16_t operation = ntohs(header.ar_op); local 107 if (operation != ARPOP_REPLY && operation != ARPOP_REQUEST) { 109 << operation; 122 operation_ = operation;
|
H A D | arp_packet.h | 65 uint16_t operation() const { return operation_; } function in class:shill::ArpPacket 66 void set_operation(uint16_t operation) { argument 67 operation_ = operation;
|
H A D | passive_link_monitor_unittest.cc | 105 void ReceiveArpPacket(uint16_t operation) { argument 107 operation,
|
H A D | active_link_monitor_unittest.cc | 274 void ReceiveResponse(uint16_t operation, argument 279 client_test_helper_.GeneratePacket(operation,
|
/system/connectivity/shill/dbus/ |
H A D | chromeos_mm1_sim_proxy.cc | 120 const string& operation) { 121 SLOG(&proxy_->GetObjectPath(), 2) << __func__ << ": " << operation; local 126 const string& operation, 128 SLOG(&proxy_->GetObjectPath(), 2) << __func__ << ": " << operation; local 119 OnOperationSuccess(const ResultCallback& callback, const string& operation) argument 125 OnOperationFailure(const ResultCallback& callback, const string& operation, brillo::Error* dbus_error) argument
|
H A D | chromeos_mm1_modem_modemcdma_proxy.cc | 105 const ResultCallback& callback, const string& operation) { 106 SLOG(&proxy_->GetObjectPath(), 2) << __func__ << ": " << operation; local 112 const string& operation, 114 SLOG(&proxy_->GetObjectPath(), 2) << __func__ << ": " << operation; local 104 OnOperationSuccess( const ResultCallback& callback, const string& operation) argument 110 OnOperationFailure( const ResultCallback& callback, const string& operation, brillo::Error* dbus_error) argument
|
H A D | chromeos_mm1_modem_proxy.cc | 257 const string& operation) { 258 SLOG(&proxy_->GetObjectPath(), 2) << __func__ << ": " << operation; local 263 const string& operation, 265 SLOG(&proxy_->GetObjectPath(), 2) << __func__ << ": " << operation; local 256 OnOperationSuccess(const ResultCallback& callback, const string& operation) argument 262 OnOperationFailure(const ResultCallback& callback, const string& operation, brillo::Error* dbus_error) argument
|
H A D | chromeos_device_dbus_adaptor.cc | 257 const string& operation, 263 *out_state = device_->PerformTDLSOperation(operation, peer, &e); 256 PerformTDLSOperation(brillo::ErrorPtr* error, const string& operation, const string& peer, string* out_state) argument
|
/system/connectivity/shill/wifi/ |
H A D | tdls_manager.cc | 57 const string& operation, 61 SLOG(this, 2) << "Processing TDLS command: " << operation 65 if (operation == kTDLSDiscoverOperation) { 67 } else if (operation == kTDLSSetupOperation) { 69 } else if (operation == kTDLSStatusOperation) { 92 } else if (operation == kTDLSTeardownOperation) { 95 error->Populate(Error::kInvalidArguments, "Unknown operation"); 101 "TDLS operation failed"); 56 PerformOperation(const string& peer_mac_address, const string& operation, Error* error) argument
|
H A D | wifi.cc | 1129 "DBus operation failed for rpcid %s.", 1162 "DBus operation failed for rpcid %s.", 2889 string WiFi::PerformTDLSOperation(const string& operation, argument 2892 SLOG(this, 2) << "TDLS command received: " << operation 2904 return tdls_manager_->PerformOperation(peer_mac_address, operation, error);
|
H A D | wifi_unittest.cc | 1263 const string& operation, const string& peer, Error* error) { 1264 return wifi_->PerformTDLSOperation(operation, peer, error); 1262 PerformTDLSOperation( const string& operation, const string& peer, Error* error) argument
|
/system/connectivity/shill/cellular/ |
H A D | cellular_capability.cc | 64 void CellularCapability::OnUnsupportedOperation(const char* operation, argument 67 message.append(operation).append(" operation is not supported.");
|
/system/tpm/trunks/ |
H A D | mock_tpm.cc | 196 const TPM_EO& operation, 200 operation, authorization_delegate, callback); 188 PolicyNV(const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyNVResponse& callback) argument
|
H A D | tpm_generated.cc | 27337 const TPM_EO& operation, 27393 operation, 27602 const TPM_EO& operation, 27622 operation, 27641 const TPM_EO& operation, 27654 operation, 27672 const TPM_EO& operation, 27714 operation, 27911 const TPM_EO& operation, 27927 operation, 27328 SerializeCommand_PolicyNV( const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument 27593 PolicyNV( const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyNVResponse& callback) argument 27632 PolicyNVSync( const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate) argument 27667 SerializeCommand_PolicyCounterTimer( const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument 27906 PolicyCounterTimer( const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate, const PolicyCounterTimerResponse& callback) argument 27937 PolicyCounterTimerSync( const TPMI_SH_POLICY& policy_session, const std::string& policy_session_name, const TPM2B_OPERAND& operand_b, const UINT16& offset, const TPM_EO& operation, AuthorizationDelegate* authorization_delegate) argument [all...] |
/system/connectivity/shill/test-rpc-proxy/ |
H A D | proxy_dbus_shill_wifi_client.cc | 614 const std::string& operation, 626 operation, peer_mac_address, out_params, nullptr); 612 PerformTdlsOperation( const std::string& interface_name, const std::string& operation, const std::string& peer_mac_address, std::string* out_params) argument
|
/system/update_engine/payload_generator/ |
H A D | delta_diff_utils.cc | 242 new_file.name, // operation name 272 "<non-file-data>", // operation name 301 // regardless of the contents since they are already copied and no operation 385 // We split the operation at the extent boundary or when bigger than 400 // The current operation represents the move/copy operation for the 434 InstallOperation operation; local 459 &operation)); 461 // Check if the operation writes nothing. 462 if (operation 550 InstallOperation operation; local [all...] |
H A D | inplace_generator.cc | 170 // make node depend on the copy operation 174 // Set src/dst extents and other proto variables for copy operation 194 // Add an edge from dst to copy operation 358 // converted to a REPLACE or REPLACE_BZ operation. Returns true on success, 466 // copy operation, we can replace all the dest extents w/ the real 564 // Replace the operation with a REPLACE or REPLACE_BZ to generate the same 577 -1, // chunk_blocks, forces to have a single operation. 671 const InstallOperation& operation, 676 TEST_AND_RETURN_FALSE(operation.dst_extents_size() > 0); 681 (field == READER) ? operation 670 AddInstallOpToBlocksVector( const InstallOperation& operation, const Graph& graph, Vertex::Index vertex, vector<Block>* blocks) argument 708 AddInstallOpToGraph(Graph* graph, Vertex::Index existing_vertex, vector<Block>* blocks, const InstallOperation operation, const string& op_name) argument [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_int.h | 407 UINT8 operation; /* one logic channel can have one operation active */ member in struct:__anon918 408 UINT8 op_subtype; /* operation subtype */ 409 UINT8 status; /* operation status */
|
H A D | gatt_utils.c | 1206 if (p_clcb->operation == GATTC_OPTYPE_DISCOVERY && 1270 if (p_clcb->operation == GATTC_OPTYPE_DISCOVERY && 2177 UINT8 op = p_clcb->operation, disc_type=GATT_DISC_MAX; 2180 UINT8 operation; local 2183 status, p_clcb->operation, p_clcb->op_subtype); 2186 if (p_cmpl_cb != NULL && p_clcb->operation != 0) 2188 if (p_clcb->operation == GATTC_OPTYPE_READ) 2197 if (p_clcb->operation == GATTC_OPTYPE_WRITE) 2215 if (p_clcb->operation == GATTC_OPTYPE_CONFIG) 2218 if (p_clcb->operation [all...] |
/system/core/libpixelflinger/include/private/pixelflinger/ |
H A D | ggl_context.h | 284 uint8_t operation; member in struct:android::blend_state_t
|
/system/update_engine/payload_consumer/ |
H A D | delta_performer.cc | 201 // expect an update to have at least one operation, so the expectation is that 251 LOG(ERROR) << "Failed to perform " << op_type_name << " operation " 630 // Check whether we received all of the next operation's data payload. 634 // Validate the operation only if the metadata signature is present. 647 LOG(ERROR) << "Mandatory operation hash check failed"; 652 LOG(WARNING) << "Ignoring operation validation errors"; 657 // Makes sure we unblock exit when this operation completes. 695 // In major version 2, we don't add dummy operation to the payload. 833 const chromeos_update_engine::InstallOperation& operation) { 835 if (!operation 832 CanPerformInstallOperation( const chromeos_update_engine::InstallOperation& operation) argument 848 PerformReplaceOperation( const InstallOperation& operation) argument 893 PerformZeroOrDiscardOperation( const InstallOperation& operation) argument 934 PerformMoveOperation(const InstallOperation& operation) argument 1008 ValidateSourceHash(const brillo::Blob& calculated_hash, const InstallOperation& operation) argument 1024 PerformSourceCopyOperation( const InstallOperation& operation) argument 1107 PerformBsdiffOperation(const InstallOperation& operation) argument 1165 PerformSourceBsdiffOperation( const InstallOperation& operation) argument 1237 ExtractSignatureMessageFromOperation( const InstallOperation& operation) argument 1447 ValidateOperationHash( const InstallOperation& operation) argument [all...] |